Even baseball teams are hacking their rivals now. And the latest series in the CSI television franchise? CSI: Cyber, starring Patricia Arquette and Ted Danson. .... (the best antivirus software catches only 5% of online threats; 80% of hackers work for organized crime rings) ..... Chinese irons and teakettles that were illicitly outfitted with Wi-Fi cards, allowing the appliances to secretly join their owners’ home networks and spread viruses and spam. ..... killer robots to plagues that are genetically engineered to attack a specific person (say, a sitting head of state) ........ researchers were able to identify specific people in anonymized data sets by using “a receipt, an Instagram post, and a Tweet about a new purchase or a Facebook post that included the location of a favorite bar or a restaurant.” ....... the United States, unlike many other countries, doesn’t classify privacy as a human right; instead, its laws tend to address privacy only after it’s been violated—in the wake of a data breach, for example. So we are exposed to anyone with the know-how and the inclination to violate it, including our own government. ...... hackers can change their tactics far faster and more easily than we can update our defenses ..... They can sidestep security simply by changing their IP addresses or adding a few lines of code to their malware, and they relentlessly pick apart apps, websites, and devices to find security holes they can exploit. New ways to steal your money and personal information are being dreamed up as you read this. ........ Cybersecurity books are a 20th-century solution to a 21st-century problem, and the solution isn’t working .... far too many people are still using passwords such as “123456” and “password,” and cybercrime is worse than ever. ..... The bad guys are already working together, whether through a catalog of common internet-of-things devices and how to hack them, the live tech support that attends one of the most nefarious malware packages, or the organized cybercrime rings themselves.
Showing posts with label Malware. Show all posts
Showing posts with label Malware. Show all posts
Wednesday, November 04, 2015
The Evolving Cyberthreat
The Evolving Cyberthreat
Tuesday, July 24, 2012
Customized Threats
Image via CrunchBase |
a refinement to the technique could make automated analysis of malware nearly impossible ..... The makers of antivirus software regularly collect samples of malware and then use automated analysis to generate a collection of identifying characteristics, commonly called a signature. .... polymorphism—a technique for changing programs each time they are copied to a new machine ..... The database of malware maintained by Symantec includes about 19 million signatures. In its annual Internet Security Threat Report released earlier this year, Symantec stated that its automated analysis systems analyzed 403 million unique variants of malicious programs in 2011, a 41 percent increase from the 286 million analyzed in 2010. Without automation, this task would be much harder.The devil has time on his hands, looks like. The fight between good and evil continues. This reminds me of This World dictators beating the protesters in their use of information technology. Like in Burma several years back the authorities encouraged protesters to go out in the streets and take pictures and upload them online. Then they coldly downloaded them to identify and punish individual protesters.
Related articles
Subscribe to:
Posts (Atom)